{"product_id":10444,"v_id":10444,"product_name":"IBM WebSphere Application Server Network Deployment (32-bit) V7","certification_status":"Not Certified","certification_date":"2012-05-25T00:05:00Z","tech_type":"Web Server","vendor_id":{"name":"IBM Corporation","website":"https://www.ibm.com"},"vendor_poc":"Carlton Mason","vendor_phone":"512-286-7429","vendor_email":"ckmason@us.ibm.com","assigned_lab":{"cctl_name":"Leidos Common Criteria Testing Laboratory"},"product_description":"<p>The TOE is IBM&rsquo;s implementation of an application server:</p>\r\n<ul>\r\n<li>WebSphere Application Server Network Deployment (32-bit) V7.0.0.19 with APAR PM53930 </li>\r\n</ul>\r\n<p>The TOE&rsquo;s primary purpose is to provide an environment for running and managing user-supplied enterprise applications and their components.&nbsp; In particular, the product provides the capabilities to identify users and to control what resources a user can access through enterprise applications. In addition to its primary purpose, the product provides tools for doing useful functions such as assembling and troubleshooting enterprise applications.</p>\r\n<p class=\"BodyChar\">The WebSphere Application Server TOE Components are the Product Application Server, Product HTTP Server, Product HTTP Server Plug-Ins, wsadmin tool, Product Deployment Manager Server, and Product Node Agent Server.</p>","evaluation_configuration":null,"security_evaluation_summary":"<p>The evaluation was carried out in accordance to the Common Criteria Evaluation and Validation Scheme (CCEVS) process and scheme. The evaluation demonstrated that the WebSphere Application Server TOE<em> </em>meets the security requirements contained in the Security Target.&nbsp; The criteria against which the WebSphere Application Server TOE was judged are described in the Common Criteria for Information Technology Security Evaluation, Version 3.1. The evaluation methodology used by the evaluation team to conduct the evaluation is the Common Methodology for Information Technology Security Evaluation, Version 3.1.&nbsp; Science Application International Corporation (SAIC) determined that the evaluation assurance level (EAL) for the WebSphere Application Server TOE is EAL 4 augmented with ALC_FLR.2.&nbsp; The TOE, configured as specified in the installation guide, satisfies all of the security functional requirements stated in the Security Target.&nbsp; Several validators on behalf of the CCEVS Validation Body monitored the evaluation carried out by SAIC.&nbsp; The evaluation was completed in May 2012.&nbsp; Results of the evaluation can be found in the Common Criteria Evaluation and Validation Scheme Validation Report for<em> </em>WebSphere Application Server Network Deployment (32-bit) V7.0.0.19 with APAR PM53930<em> </em>prepared by CCEVS.</p>","environmental_strengths":"<p>The<strong> </strong>WebSphere Application Server TOE is a commercial product that provides identification, access control, audit, and the management of access control to protective resources. Additionally, the TOE provides a mechanism for requiring requests from remote callers to be encrypted using SSL (note that SSL is outside the scope of the TOE).&nbsp; The WebSphere Application Server TOE provides a level of protection that is appropriate for operating environments where the WebSphere Application Server TOE and the platform upon which it is installed can be appropriately protected from physical attacks.</p>\r\n<p>&nbsp;</p>\r\n<p>The WebSphere Application Server TOE supports the following security functions: Identification, Access Control, Security Management, Audit, and Invocation of SSL.</p>\r\n<p>&nbsp;</p>\r\n<p class=\"Body\"><strong>Identification and Re-identification</strong></p>\r\n<p>The TOE identifies a client before performing any other TSF mediated action for the client with the exception of access to a method or static web content that is not configured with a security constraint or specifically allows access to &ldquo;Everyone&rdquo;. The environment is depended upon to authenticate and maintain security attributes associated with users.&nbsp;</p>\r\n<p>&nbsp;<strong>Access Control</strong></p>\r\n<p>The TOE provides access control functions that allow only authorized remote callers to access to the sensitive resources. The TOE permits a client to access a protected resource only if a user or group ID of the user is mapped to a role that has permission to access the resource. The resources protected by the TOE are:</p>\r\n<p>&nbsp;</p>\r\n<ul>\r\n<li>Methods in deployed enterprise beans</li>\r\n<li>Methods and HTML pages in deployed web server applications</li>\r\n<li>The Administration Service</li>\r\n<li>Naming Directory</li>\r\n<li>TOE files</li>\r\n<li>Configuration data</li>\r\n<li>TOE runtime state</li>\r\n<li>Transactions and activities</li>\r\n<li>Messaging resources (e.g. local bus, queue destinations)</li>\r\n<li>UDDI resources</li>\r\n<li>TOE location service entries</li>\r\n<li>Methods and attributes in user MBeans</li>\r\n</ul>\r\n<p><strong>Security Management</strong></p>\r\n<p class=\"Body\">The TOE maintains the following Administration roles:</p>\r\n<ul>\r\n<li>Administrator</li>\r\n<li>Configurator</li>\r\n<li>Monitor</li>\r\n<li>Operator</li>\r\n<li>Deployer</li>\r\n<li>AdminSecurityManager</li>\r\n<li>Auditor </li>\r\n</ul>\r\n<p class=\"Body\">These roles may use the security management functions that provide a mechanism for dynamically configuring some security attributes used by TOE access control functions.</p>\r\n<p class=\"Body\">The TOE maintains other roles as follows:</p>\r\n<ul>\r\n<li><em>Naming roles:</em> COSNamingCreate, COSNamingDelete, COSNamingRead, COSNamingWrite (these roles can manage the TOE naming directory).</li>\r\n<li><em>UDDI Roles:</em> SOAP_Publish_User, V3SOAP_CustodyTransfer_User_Role, V3SOAP_Publish_User_Role, V3SOAP_Security_User_Role, EJB_Publish_Role (these roles can manage the Protected UDDI registry resources)</li>\r\n<li><em>Messaging Roles</em>: Browser, Bus Connector, Creator, Receiver, Sender (these roles can manage various messaging objects such as Queue and Temporary Destinations, Topics, and TopicSpace)</li>\r\n</ul>\r\n<p>&nbsp;</p>\r\n<p class=\"Body\"><strong>Security Audit</strong></p>\r\n<p>The TOE provides audit functions that provide authorized administrators to associate users with security relevant actions for identification, access control and for enabling and disabling the audit function.&nbsp; The TOE relies on the operational environment for audit record storage.</p>\r\n<p>&nbsp;</p>\r\n<p><strong>Invocation of SSL</strong></p>\r\n<p>The TOE provides an invocation of SSL function that requires a remote caller to invoke TLS 1.0 using the configured algorithms to allow for the session to be encrypted when the remote caller issues a request to the TOE over the remote interface of the IBM HTTP Server component. Note: This function does not perform the actual SSL encryption, yet provides a mechanism for requiring requests from remote callers to be encrypted.</p>","features":[]}